ryantig / grepcidr
grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitrary networks
☆26Updated last year
Alternatives and similar repositories for grepcidr:
Users that are interested in grepcidr are comparing it to the libraries listed below
- egrets monitors egress☆45Updated 4 years ago
- Osquery Packs we use for customer security hardening☆12Updated 5 months ago
- ☆15Updated 3 years ago
- ☆47Updated 2 months ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆22Updated 2 years ago
- Library and example applications for using/abusing the information-leaky L2Trace service on Cisco switches. PSIRT Advisory: cisco-sa-2019…☆3Updated 2 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- ssh jump host appliance☆26Updated 3 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated last year
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆32Updated 3 years ago
- ☆14Updated last month
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Parser for Windows PowerShell script block logs☆13Updated 2 months ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆22Updated 4 months ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Kibana app for RedELK☆16Updated 2 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- ☆21Updated 3 years ago
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Updated 3 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Updated 6 years ago
- Security Alert Decoration☆27Updated this week
- Some resources to facilitate my blog on auditd for security monitoring☆12Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated 9 months ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆41Updated 2 years ago
- Qemuno Framework☆24Updated 2 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 6 years ago
- Source code and examples for Antignis☆36Updated 2 years ago
- Offline-viewer for registry files☆11Updated 6 months ago